In this article by Joseph Muniz and Aamir Lakhani, the authors of the book Web Penetration Testing with Kali Linux, web Penetration Testing is described in brief. Many organizations offer security services and use terms such as security audit, network or risk assessment, and Penetration Test with overlapping meanings. By definition, an audit is a measurable technical assessment of a system(s) or application(s). Security assessments are evaluations of risk, meaning services used to identify vulnerabilities in systems, applications, and processes.Read Penetration Testing and Setup in full
In this article by Daniel Li, author of the book Instant Brainshark, we'll be looking at how to take full advantage of Brainshark's narrated slideshow functionality by following best practices in the presentation design. This will be covered using a list of tips, followed by why these best practices are followed in industry. Lastly, we will look into ways to aesthetically improve existing and future presentations.Read Increasing sales with Brainshark slideshows/documents in full
This article written by Mark Aberdour, the author of Moodle for Mobile Learning, aims to provide you with a vision of how Moodle for mobile learning can be put to use in your own organization. It will give you an understanding of the foundations of mobile learning, some insights into how important mobile learning is becoming, and how it is gaining momentum in different sectors. At the end of this article, you should have an understanding of the key concepts of mobile learning so that you can apply these concepts in order to enhance your own Moodle courses. We want to set you off on a mobile learning path that will allow you to better meet the needs and expectations of your learners who, as we will see, already use mobile devices as the backbone of their daily online interactions, and expect mobile compatibility to be the norm.
In this article, we will look at the following:
- Background to mobile learning
- Background to mobile devices
- The 4 Cs of mobile learning
- Your mobile learning strategy
- Understanding your learners and how they use their devices
- Mobile usage in industry
In this article by Peter A. Pilgrim, author of the book Java EE 7 Developer Handbook, we will cover the Java API for RESTful services otherwise abbreviated to JAX-RS. It was the year, 2000, when Roy Fielding published his PhD thesis entitled Representational State Transfer: an Architecture Style. Since its publication over the past decade there has been a rapid growth of interest, applications, and implementations of REST style interfaces and application.Read RESTful Services JAX-RS 2.0 in full
This article by Geoff Chiang the author of Instant Spring Tool Suite is aiming to get you up and running developing with various Spring technologies, providing you with enough to give you a head start in Spring development.
The term web service is a nebulous one, encompassing a range of both technologies and approaches. At its heart, a web service is simply a software service which is accessible over a network, designed for machine-to-machine interaction. Early web services were based on the W3C WS-* set of standards, with interfaces described using WSDL and interaction using SOAP messages. This approach seems to have fallen out of favor somewhat, with lightweight RESTful approaches now prevalent.
In this recipe, we're going to retrieve weather data from the Australian Bureau of Meteorology. This service exposes Australian weather data in JSON format. As we're about to see, STS and Spring Integration allow us to interact with web services with very little effort.Read Connecting to a web service (Should know) in full
In this article, by Sven Vermeulen, the author of SELinux System Administration, has explained how to manage user logins. When we log in to an SELinux enabled system, we are assigned with a default context to work in. This context contains a SELinux user part, a SELinux role, a domain, and optionally a sensitivity range.
In this article, we will define users that have sufficient rights to do their jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection.Read Managing User Logins in full